not all breaches to computer security are planned
hackers often claim the intent of their security breaches is to improve security
many methods exist ot guarantee completely a computer or network is safe from computer viruses, worms, and trojan horses
cybercriminals install malicious bots unprotected computers to create zombie armies
a honeypot is a computer that is set up to entice an intruder to break in
biometric payment involves a customer's fingerprint being read by a fingerprint scanner that is linked to a payment method such as checkin account or credit card
encrypted data is called plaintext
a digital signature is a mathematical formula that generates a code from the contents of the message
an online ups switches to battery power when a problem occurs in a power line
digital rights management is a strategy designed to prevent illegal distriubtion of computer viruses etc.
a cookie is a small text fiel that a wb server stores on the computer
green computing involves reducing the electricity while using a computer, but the practices increase enviormental waste.
a computer infected system is all but
available memory is more
malware is a term that can be used to describe
worms spyware back doors
computer unkowingly being controlled by another remote computer
used for spam and phishing scams
physical access control such as locked doors and windows usually are adequate to protect against
software piracy continues
because in some countries legal protection of software does not exist
windows vista include a featurecalled
bitlocker, which allows you to enrypte files
a notice that guarantees a usar or website site is legit
prolonged under voltage
defined as gaining inauthorized access or obtaining confedential info by taking advantage of the trusted human
examination of computer media, programs, data and log files on computers, servers, networks
inflammation of nerve connecting forearm to the palm of the wrist
someone who accesses a computer or net illegally with the intent of malicious actions
potentially damaging computer program that affects infects a computer negatively
area of the hard disk that holds an infected file until the infection is removed
a group of comprimised computers connected to a network that is being used as part of a network that attacks other networks
protects a personal computer and its data from unauthorized intrusions
private combination of characteristic into digital code
translates a personal characeristic into digital code
provide steady flow of electricity
key commands and startup info
displays online advertisment
Please allow access to your computer’s microphone to use Voice Recording.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Your microphone is muted
For help fixing this issue, see this FAQ.